CVE-2023-34050
Description
In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized.
Specifically, an application is vulnerable if
* the SimpleMessageConverter or SerializerMessageConverter is used
* the user does not configure allowed list patterns
* untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content
NVD
Severity: MEDIUM
CVE ID: CVE-2023-34050
CVSS Score: 4.3
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
VMware
Severity: MEDIUM
CVE ID: CVE-2023-34050
CVSS Score: 5.0
CVSS Metrics: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
Proof Of Concept
X1r0z
PoC of Spring AMQP Deserialization Vulnerability (CVE-2023-34050)
Refrence: GitHub